Internet Fraud / Identity Theft
Credit Card Fraud: The unauthorized use of credit cards to obtain money or property Common ways of obtaining credit card numbers
- Unsecure Website
- Identity Theft Scheme
- Conventional Methods (Swapping hand held terminal)
- SQL Injection: Inserting SQL into input fields of an online form - Man/Mafia in the middle: Asks for verification with credit card information to make purchases Avoiding Fraud
- Ensure a site is secure
- Reputable source
- Watch your credit card statements
- Confirm legitimacy of a company
Fraud TypesSpoofing: Pretending to be someone other than the actual source Phishing: Claiming to be a legitimate business in an attempt to trick people into divulging sensitive information by getting them to go to a specified website Spear Phishing: Targeting certain individuals

Infallible forecast Scam: Display ability to predict stock twice. 25% of victims are likely to think they are infallible and may likely invest with them. Computer problem areas
- Use of SIN as a primary key in databases
- Ecommerce
- Vulnerability of Computer Networks

Evidence: proof about a fact that did or did not happen
- Testimony of a witness
- Physical evidence
- Electronic evidence
Artifact - change in evidence that causes investigator to think the evidence relates to the crime Inculpatory - evidence that supports a given theory
Exculpatory - evidence that contradicts a given theory
Circumstantial - shows circumstances that logically lead to a conclusion of fact Hearsay - second-hand evidence
Admissible - evidence that is allowed in court
Inadmissible - evidence that cannot be presented at trial
Tainted – evidence obtained by illegal search or seizure
Material - evidence relevant and significant to lawsuit
Immaterial - evidence that is not relevant or significant
Search Warrant- Issued only if law enforcement provides sufficient proof that there is probable cause a crime has been committed - Premises, things, and persons to be searched must be specified Electronic Evidence

- Volatile and may be easily changed
- Conversely is difficult to delete entirely

Physical evidence collected
- Seize a computer- Using OS to power down is risky as temporary files might be deleted and date/time stamps changed - Current best practice is to unplug the PC from its power source, preserving the data environment - Don’t turn on a PC without having write-blocking software or devices in place - Write-blocking devices prevent any writes to a drive such as may occur when simply turning on a system - Create a drive image

> Drive imaging or mirror imaging
> Sector-by-sector or bit-stream imaging
- Protect data from any type of alteration
- Work from a forensic copy of the original drive or device

YOU MAY ALSO FIND THESE DOCUMENTS HELPFUL

...situations, this is rarely the case 3. The method of agreement requires the min of 2 instances, it probably commits the fallacy of small sampling
Good Argument: 1.valid and Sound 2. Inductively strong 3. Can’t be circular 4. Can be grounded by reason
Exam: 1. Quotation Mark and Para No. Brief explanation of why the branch is there (1-2 sentences)
2. [(S3+S4)R2] i. what is the nature of the argument (induction/deduction?) ii. Criteria of what is good/bad and why is it so iii....

...Marketing Management - cheatsheet Definition of marketing: Marketing is an organizational function and a set of processes for creating, communicating and delivering value to customers and for managing customer relationships in ways that benefit the organization and its stakeholders -American Marketing Association (2004). New assumptions: “Connect and collaborate”, not “command and control”. Market as forum for cocreation of experiences. Customers and partners as...

...﻿1. The sociological perspective, as a way of thinking about the world, includes the sociological imagination from C. Wright Mills, the beginner’s mind from Bernard McGrane, and the idea of culture shock from anthropology. Explain what all three of these concepts have in common.
Response: All three of these concepts have in common are the idea of breaking down social barriers to gain a different perspective on culture people and behaviors. When a person is in a new area where the...

...Chapter 1: Intro
Independent Variable - variable you deliberately change during an experiment
Theory - explanation based on a large number of experiments
Hypothesis - educated prediction of cause and effect - what you test in an experiment
Control - a zero or set form of the independent variable
Dependent - variable you measure because you think it could change
7 characteristics: order, regulation, growth and development, energy processing, response to the environment, reproduction,...